Search. Read. Cite.

Easy to search. Easy to read. Easy to cite with credible sources.

Articles by Xingming Sun (28)

Natural Language Watermarking Using Chinese Syntactic Transformations

Hong Wang, Xingming Sun, Yuling Liu and Yongping Liu

Information Technology Journal 7 ( 6 ): 904 - 910 , 2008

MIMIC-PPT: Mimicking-Based Steganography for Microsoft Power Point Document

Yuling Liu, Xingming Sun, Yongping Liu and Chang-Tsun Li

Information Technology Journal 7 ( 4 ): 654 - 660 , 2008

Multi-Blogs Steganographic Algorithm Based on Directed Hamiltonian Path Selection

Gang Luo, Xingming Sun and Lingyun Xiang

Information Technology Journal 7 ( 3 ): 450 - 457 , 2008

DOSM: A Data-Oriented Security Model Based on Information Hiding in WSNs

Xiangrong Xiao, Xingming Sun, Xinbing Wang and Lei Rao

Information Technology Journal 8 ( 5 ): 678 - 687 , 2009

Feature Selection for Image Steganalysis using Hybrid Genetic Algorithm

Zhihua Xia, Xingming Sun, Jiaohua Qin and Changming Niu

Information Technology Journal 8 ( 6 ): 811 - 820 , 2009

Fair Blind Signature Based Authentication for Super Peer P2P Network

Xiaoliang Wang and Xingming Sun

Information Technology Journal 8 ( 6 ): 887 - 894 , 2009

Steganalysis Based on Difference Statistics for LSB Matching Steganography

Jiaohua Qin, Xingming Sun, Xuyu Xiang and Zhihua Xia

Information Technology Journal 8 ( 8 ): 1281 - 1286 , 2009

A Semi-Fragile Watermarking Algorithm using Adaptive Least Significant Bit Substitution

Hengfu Yang, Xingming Sun and Guang Sun

Information Technology Journal 9 ( 1 ): 20 - 26 , 2010

Robust Adaptive Image Watermarking using Visual Models in DWT and DCT Domain

Ahmed A. Abdulfetah, Xingming Sun, Hengfu Yang and Nur Mohammad

Information Technology Journal 9 ( 3 ): 460 - 466 , 2010

Software Watermarking Based on Condensed Co-Change Graph Cluster

Guang Sun and Xingming Sun

Information Technology Journal 9 ( 5 ): 949 - 955 , 2010

Survey of Anonymity and Authentication in P2P Networks

Xiaoliang Wang, Lincong Yang, Xingming Sun, Jinsong Han, Wei Liang and Lihong Huang

Information Technology Journal 9 ( 6 ): 1165 - 1171 , 2010

Invertible Transform-Based Reversible Text Watermarking

Zhijie Liu, Xingming Sun, Yuling Liu, Lincong Yang, Zhangjie Fu, Zhihua Xia and Wei Liang

Information Technology Journal 9 ( 6 ): 1190 - 1195 , 2010

CADS: Co-operative Anti-fraud Data Storage Scheme for Unattended Wireless Sensor Networks

Zhiqiang Ruan, Xingming Sun, Wei Liang, Decai Sun and Zhihua Xia

Information Technology Journal 9 ( 7 ): 1361 - 1368 , 2010

An Efficient Scheme Against Node Capture Attacks using Secure Pairwise Key for Sensor Networks

Heng Ren, Xingming Sun, Zhiqiang Ruan and Baowei Wang

Information Technology Journal 10 ( 1 ): 71 - 79 , 2011

The Design and FPGA Implementation of FSM-based Intellectual Property Watermark Algorithm at Behavioral Level

Wei Liang, Xingming Sun, Zhiqiang Ruan and Jing Long

Information Technology Journal 10 ( 4 ): 870 - 876 , 2011

Steganography in Ms Excel Document using Text-rotation Technique

Bin Yang, Xingming Sun, Lingyun Xiang, Zhiqiang Ruan and Ruizhen Wu

Information Technology Journal 10 ( 4 ): 889 - 893 , 2011

Multi-mark: Multiple Watermarking Method for Privacy Data Protection in Wireless Sensor Networks

Baowei Wang, Xingming Sun, Zhiqiang Ruan and Heng Ren

Information Technology Journal 10 ( 4 ): 833 - 840 , 2011

A Secure Steganographic Method via Multiple Choice Questions

Lingyun Xiang, Xingming Sun, Yuling Liu and Hengfu Yang

Information Technology Journal 10 ( 5 ): 992 - 1000 , 2011

An Efficient Data Delivery Mechanism by Exploring Multipath Routes for Wireless Sensor Networks

Zhiqiang Ruan and Xingming Sun

Information Technology Journal 10 ( 7 ): 1359 - 1366 , 2011

Detection of LSB Matching Steganography using Neighborhood Node Degree Characteristics

Bin Xia, Xingming Sun, Lingyun Xiang, Haijun Luo and Hengfu Yang

Information Technology Journal 10 ( 8 ): 1601 - 1607 , 2011

Robust Text Hashing for Content-Based Document Authentication

Lina Tan and Xingming Sun

Information Technology Journal 10 ( 8 ): 1608 - 1613 , 2011

An Algorithm Based on Diagonal Feature for Local Alignment in Large Database

Decai Sun, Xingming Sun, Xiaoxia Wang and Zhiqiang Ruan

Information Technology Journal 10 ( 8 ): 1579 - 1586 , 2011

An Excellent Image Data Hiding Algorithm Based on BTC

Nur Mohammad, Xingming Sun and Hengfu Yang

Information Technology Journal 10 ( 7 ): 1415 - 1420 , 2011

A Novel Reversible Text Data Hiding Scheme

Bin Yang, Xingming Sun, Jianjun Zhang, Lingyun Xiang, Xianyi Chen and Xu Li

Information Technology Journal 11 ( 8 ): 1084 - 1090 , 2012

Skeleton-based Chinese Text Image Watermark Algorithm Robust to Printing and Scanning

Xingming Sun, Shufang Wang, Zhihua Xia and Xinhui Wang

Information Technology Journal 12 ( 11 ): 2130 - 2137 , 2013

An Adaptive Visible Watermarking Algorithm for BTC Compressed Images

Nur Mohammad, Xingming Sun and Hengfu Yang

Information Technology Journal 13 ( 3 ): 536 - 541 , 2014

Enabling Similarity Search over Encrypted Images in Cloud

Yi Zhu, Xingming Sun, Zhihua Xia, Li Chen, Tao Li and Daxing Zhang

Information Technology Journal 13 ( 5 ): 824 - 831 , 2014

DCSCS: A Novel Approach to Improve Data Accuracy for Low Cost Meteorological Sensor Networks

Huan Liu, Baowei Wang, Xingming Sun, Tao Li, Qi Liu and Yunbiao Guo

Information Technology Journal 13 ( 9 ): 1640 - 1647 , 2014